Remove CTO Remove Firewall Remove Security
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.

Security 278
article thumbnail

Kicking the Tires: Verisign DNS Firewall

CTOvision

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Verisign has leveraged its industry leading DNS capabilities and unmatched technical ability in the DNS arena to develop the Verisign DNS Firewall offering.

Firewall 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Enterprise has too many Cyber-ish People

CTOvision

Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’ doing really pretty boring jobs. We need to use technology and change processes to manage the problems that technology can create.

article thumbnail

Video: How an IoT firewall can protect your smart office from cyber-attacks

Tech Republic Security

Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware.

Firewall 131
article thumbnail

Maturing Security Posture and Mitigating Concerns with FireMon

CTOvision

According to Greg Young of the Gartner Group, many organizations are taking the “adopt first, secure later” approach to the cloud. Currently, IT organizations are initially finding ways to meet emerging business requirements, and then realizing the necessity of identifying additional security controls. Find out more about FireMon here.

Security 150
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Security policies are tailored to the specific mission goals.

Policies 268
article thumbnail

Continuous Monitoring – Part 1

CTOvision

From customers to experts to standards bodies, a consensus is building that says continuous monitoring will vastly improve the security of our networks and critical infrastructure. We can provide a simple explanation by using a physical security example. Create a way to score an organization’s security risk. So what is it?!

HP 253